Keamanan Teknologi Informasi

EC-Council Certified Incident Handler (ECIH)

EC-Council Certified Incident Handler (ECIH) course is designed to train the candidates of any IT security professionals to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. The Seminar will be in the form of training and delivering the curriculums and modules within 2 days include the exam and practical session.

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA) is for experienced professionals in the industry and is backed by a curriculum designed by the best in the field. Students earn greater industry acceptance as seasoned security professionals. Certified Security Analysts learn to analyze the outcomes of security tools and security testing techniques. The Seminar will be in the form of training and delivering the curriculums and modules within 3 days include a practical session, discussion, exam, and evaluation.

EC-Council Certified Ethical Hacker (ECEH)

EC-Council Certified Ethical Hacker (ECEH) class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! They will scan, test, hack and secure their own systems. The Seminar will be in the form of training and delivering the curriculums also a module within 3 days include a practical session, group work and discussion, and evaluation.

Computer Hacking Forensic Investigator (CHFI)

The Computer Forensic Investigation program presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation. The Seminar will be in the form of training and delivering the curriculums and modules within 3 days include a practical session, group work and discussion, and evaluation.